{{Header}}
{{Title|title=
Encrypted Email with Thunderbird
}} {{#seo:
|description=Encrypted Anonymous Email with Thunderbird
|image=Encryptedemail.jpg
}}[[File:Thunderbird256.png|thumb|128px|Mozilla Thunderbird Icon|link=Encrypted_Email_with_Thunderbird]]
{{intro|
Encrypted Anonymous Email with Thunderbird
}}
= Introduction =
Due to the complexity of software in the past, one of the most underutilized forms of protection for users is email encryption. However, it is now easier to take advantage of encrypted email via the use of Thunderbird (Mozilla's email client), which includes a [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq built-in OpenPGP] encryption program.
Thunderbird in {{project_name_long}} comes with anonymity, privacy and security settings pre-configuration through the pre-installed [https://github.com/Whonix/anon-apps-config anon-apps-config
] package.
https://github.com/Whonix/anon-apps-config/tree/master/etc/thunderbird
The following guide provides a higher security and privacy standard than relying upon online services such as ProtonMail or Tutanota, that promise "encrypted email" in transit or storage. Online systems can still be broken by an attacker capable of exploiting JavaScript flaws or undermining certificate authorities that provide encryption certificates for websites; see [[E-Mail#Webmail|Webmail]]. Further, online providers can be hacked or coerced by adversaries to provide access for extended periods.
To minimize these risks and improve security, the following guide uses a suitable [[E-Mail#Email_Clients|Desktop Email Client]] instead of webmail, paired with strong, end-to-end encryption that protects the contents so it can only be read by the intended recipient. Further, a strong encryption key-pair is created so the user has strict control over the private key, which is stored securely. Keep in mind this method does not make email infallible -- advanced adversaries can easily penetrate Internet-facing endpoints of targets with today's cutting-edge surveillance and offensive systems. Also, mistakes or poor security practices on behalf of the email recipient can inadvertently lead to disclosures of plaintext.
{{mbox
| type = notice
| image = [[File:Ambox_notice.png|40px|alt=Info]]
| text = '''Tip:''' If possible, critical information that is of high value should not traverse computer networks at all, or even risk exposure to Internet-facing computers.
Similarly, that same information should not be stored on electronic media in the first place, if that is feasible in the circumstances.
High-risk users might also consider creating an [[Air_Gapped_OpenPGP_Key|airgapped OpenPGP key pair]] rather than relying on Thunderbird as per these instructions.
}}
== Overview ==
The following guide provides steps to:
# Install the Thunderbird email client.
# Visit your suitable email provider website anonymously via Tor Browser (Preferable if it support onion hidden services).
# Create your login password and store the credentials in [https://packages.debian.org/{{Stable project version based on Debian codename}}/keepassxc KeePassXC] (optional). Installed by default in {{project_name_short}} 15.
# Setup the new email account: Thunderbird account settings, and enforce connections to the email provider's Onion Service.
# Create an OpenPGP encryption key pair and revocation certificate using the Thunderbird Setup Wizard.
# Encrypt and store the revocation certificate securely.
# Configure Thunderbird preferences for greater security and anonymity.
# Configure additional OpenPGP preferences.
# Key management: import GPG public keys.
# Export the public key to a GPG key server (optional).
# Prepare an email signature with the public GPG key ID and fingerprint (optional).
# Compose and send a test encrypted email
# Open an encrypted email received in Thunderbird.
== Warnings ==
{{mbox
| image = [[File:Ambox_warning_pn.svg.png|40px]]
| text = Due to email's design, it is a very insecure system where privacy and anonymity are concerned. Use it sparingly, and only with great discipline and caution.
}}
Operational security is imperative to maintain the integrity of properly encrypted email. Consider the following scenarios which would allow an adversary access to the plaintext or other metadata that might help deanonymize a user:
* Even if all email sent to a recipient is encrypted, if the recipient fails to encrypt the email response, then adversaries will be able to read the message and likely a quote of the original one sent.
* The names of email recipients cannot be encrypted and are therefore visible to adversaries. The subject line and references email header will also be visible in the following configuration.
* There are several different types of [https://web.archive.org/web/20170823095126/https://easycrypt.co/email-privacy-crash-course-part-3-metadata-and-anonymity/ metadata] that can be harvested from email, depending on how it is used. Therefore, users must be careful when relying on email for sensitive communications.
== Glossary ==
Terms that are commonly used in reference to email encryption are outlined below.
'''Table:''' ''Email Encryption Terms''
Source:
[https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO/GnuPG torproject.org Gnu Privacy Guard / GnuPG]
[https://www.torproject.org/about/trademark/ license]:
Content on this site is Copyright The Tor Project, Inc.. Reproduction of content is permitted under a [https://creativecommons.org/licenses/by/3.0/us/ Creative Commons Attribution 3.0 United States License]. All use under such license must be accompanied by a clear and prominent attribution that identifies The Tor Project, Inc. as the owner and originator of such content. The Tor Project Inc. reserves the right to change licenses and permissions at any time in its sole discretion.
{| class="wikitable"
|-
! scope="col"| Term
! scope="col"| Description
|-
! scope="row"| Key Pair
| A pair of asymmetric keys, commonly known as public and private keys.
|-
! scope="row"| Public Key
| The half of a key pair that is distributed publicly and used for encrypting.
|-
! scope="row" | Private Key
| The half of a key pair that is kept secret, and is used for decryption.
|-
! scope="row" | Key Server
| A server or website used for the distribution and verification of public keys.
|-
! scope="row" | Integrity
| A verification that the enclosed contents have not been tampered with in transit.
|-
! scope="row" | Confidentiality
| A verification that the enclosed contents are unreadable, except for the intended recipient.
|-
! scope="row" | Authentication
| A verification that the person who is sending / signing is who they say they are.
|-
! scope="row" | Non-repudiation
| Assurance that nobody, including the author, can dispute the origin of the message itself.
|-
! scope="row" | Asymmetric Keys
| Commonly referred to as a 'keypair'. It is two separate keys: one public, one private.
|-
! scope="row" | Symmetric Keys
| Symmetric encryption depends on using a password to encrypt the single key used for both encryption and decryption.
|-
|}
{{mbox
| image = [[File:Ambox_warning_pn.svg.png|40px]]
| text = Warning: Unless otherwise instructed to do so, manual installation of packages should be avoided, even trusted ones. This is because packages are often unsigned, and users may forget to update the software in a timely fashion. To install software users should prefer the APT secure package manager. For more information on this, See: {{kicksecure_wiki
|wikipage=Install_Software#Best_Practices
|text=Installing Software Best Practices
}}.
}}
= Install the Thunderbird Email Client =
For users that would like to learn more about Thunderbird refer to the [https://support.mozilla.org/en-US/products/thunderbird official support page]. However, modifications should not be made to Thunderbird unless you know what you are doing.
The Thunderbird email client can be installed from the terminal using APT
secure package manager.
In {{project_name_workstation_long}} ({{project_name_workstation_template}}
Template [[Qubes|{{q_project_name_long}}]]) konsole, run.
{{CodeSelect|code=
sudo apt install thunderbird
}}
Note: If the following output appears Thunderbird is already installed and no further action is needed.
Reading package lists... Done Building dependency tree Reading state information... Done thunderbird is already the newest version.= Create a New Email Account with Tor Browser = == Choose an Appropriate Email Provider == First and foremost, there are multiple email providers that users can choose from. For the purpose of this tutorial,
danwin1210.de
is used as an example. This is not an endorsement ([[Terms_of_Service#Non-Endorsement|terms of service non-endorsement]]) for danwin1210.de
. No e-mail providers are explicitly recommended by the {{project_name_short}} team. The {{project_name_short}} project is not an e-mail provider review project that recommend specific e-mail providers. Refer to the list of [[E-Mail#Anonymity_Friendly_Email_Provider_List|Anonymity Friendly Email Provider List]] for possible alternatives. If problems are experienced with danwin1210.de
, refer to the [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/EmailProvider list of providers by The Tor Project], [[E-Mail#Email_Provider_Comparison|{{project_name_short}}]] or [https://web.archive.org/web/20210511003745/https://anonymous-proxy-servers.net/en/help/email-provider.html JonDonym].
At the time of writing, danwin1210.de
is one of the few free and reliable email providers offering POP3 email access through an .onion
address, which does not require additional verification details to register an account. You will have 25MB of disk space available for your emails. For more details regarding the features and offerings of danwin1210.de
, visit http://danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5ubupvtpid.onion/.
{{mbox
| image = [[File:Ambox_warning_pn.svg.png|40px]]
| text = Never forget this is an [[Onion_Services#How_Onion_Services_Connections_Work|Onion Service]] which means there is no way of determining who is running it. If GPG is not used to encrypt email and/or the recipient of email does not encrypt it either, it can be easily read by the email service provider, random computers on the internet that relay a sent email message, or anyone else who manages to gain access to the account!
}}
== Registration Steps ==
{{Box|text=
'''1.''' Create an email account name and password for the mail provider.
{{mbox
| image = [[File:Ambox_warning_pn.svg.png|40px]]
| text = When creating an account and password do not use [[Tips_on_Remaining_Anonymous#Always_Withhold_your_Identifying_Data|identifying or familiar data]] in either! Also consider the [[Passwords#Principles_for_Stronger_Passwords|principles for stronger passwords]] and the option of lengthy [[Passwords#Generating_Unbreakable_Passwords|Diceware passphrases]].
}}
* When the page opens, open up KeePassXC and create an account and password entry for your new email account. Alternatively, write it down at home and store it in a safe place.
* When finished creating your Email Name/Username and password in KeePassXC, Follow these steps:
'''Figure:''' ''Email Registration''
[[File:Thunderbird1.png|600px]]
'''2.''' Confirm successful creation of the anonymous account.
'''Figure:''' ''Account Confirmation''
[[File:Thunderbird2.png|600px]]
'''3.''' Close Tor Browser
Since the email account is created, Tor Browser can be closed.
}}
= Setup the New Email Account in Thunderbird =
{{Box|text=
'''1.''' Open Thunderbird.
* {{non_q_project_name_short}}: Click the start menu button
→ Search and select Thunderbird
* {{q_project_name_short}}: Click the blue "Q" button
→ Click on {{project_name_workstation_vm}}
→ Select "Thunderbird"
'''Figure:''' ''Thunderbird Email Client ({{non_q_project_name_short}})''
[[File:Tempestupdate5.png]]
'''2.''' Set up the Email Account.
{{mbox
| image = [[File:Ambox_warning_pn.svg.png|40px]]
| text = '''IMPORTANT NOTE:''' Thunderbird does not store passwords in an encrypted format. Therefore, if {{project_name_workstation_short}} ({{project_name_workstation_vm}}
) is compromised, an attacker may be able to gain access to the email account if they view Thunderbird's unencrypted password storage file.
}}
The first window that will appear upon running Thunderbird for the first time will prompt you to "Set Up an Existing Email Account." Follow these steps:
* Type the alias/username that you created in the field "Your name." This will appear next to your email address in emails you send to others.
* Type the danwin1210.de
onion email address you just created into the field "Email address." example youremailusername@danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5ubupvtpid.onion
** In case you will use the clearnet version then your email going to be youremailusername@danwin1210.de
* Paste your newly created password.
* Finally, Tick "remember password" (Better user friendly method) and click the "Configure Manually" button.
'''Figure:''' ''Email Account Set Up''
[[File:Thunderbird3.png|600px]]
'''3.''' Configure Email Incoming (POP3) and Outgoing (SMTP) Connection.
You need to configure Thunderbird to connect to the hidden server (onion service) of danwin1210.de
. The fields you need to change are:
* Protocol: Pick POP3, avoid the usage of IMAP as this makes you more exposed into the internet (as it require persistent connection to function properly), drain your account limited capacity storage (which way much less than your own operating system available storage).
* Type danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5ubupvtpid.onion
in the field next to "Hostname"
* Type 995
into "Port" field.
* Choose "SSL/TLS" for "Connect security".
** Avoid the usage of [https://nostarttls.secvuln.info/ STARTTLS]
** Some email (onion) providers doesnt add TLS/SSL for their onion domain, if so then its fine to choose "None" as an option because all communications to onion domains are encrypted. Therefore, your password is not transmitted insecurely (but in our case danwin1210.de
is using self signed TLS/SSL certificate).
* Choose "Normal Password" for "Authentication Method".
** In case there was no TLS/SSL support for your email onion service its fine to choose "Password, transmitted insecurely" (but in our case danwin1210.de
onion service support TLS/SSL).
* Type the email user name you have chosen earlier into the field next to "UserName".
'''Figure:''' ''Thunderbird Server Configuration''
[[File:Thunderbird4.png|600px]]
* Press on "Confirm Security Exception" its safe to confirm it because this is self-signed certificate
'''Figure:''' ''Confirm Self-Signed TLS/SSL inside Thunderbird''
[[File:Thunderbird5.png|600px]]
Your account is now successfully connected with thunderbird.
}}
= Create an OpenPGP Key Pair and Revocation Certificate =
There are two methods for creating an OpenPGP key pair and revocation certificate -- using either the Thunderbird OpenPGP Setup Wizard, or manually creating them from the command line. The easier Thunderbird OpenPGP method is outlined below, but the [[Air_Gapped_OpenPGP_Key|manual creation of stronger keys from the command line]] is recommended for advanced users or those at high risk.
== Create an OpenPGP Key Pair by Thunderbird ==
* After successfully linked your account with thunderbird click on "End-to-end encryption".
[[File:Thunderbird6.png|600px]]
* If you missed that, you can press on your email then "End-to-end encryption" option will show up.
[[File:Thunderbird6-1.png|600px]]
* Press on "Add Key..." Option.
[[File:Thunderbird7.png|600px]]
* Since we are creating new fresh keys, choose "Create a new OpenPGP Key" then press "Continue".
[[File:Thunderbird8.png|600px]]
* For better usability we gonna choose "Key does not expire" option, though you can later change that to whatever suits you.
* We are going to choose the most common key type and size options which are RSA with 4096 (Other option provided by thunderbird is ECC).
[[File:Thunderbird9.png|600px]]
* Make sure to read the info message then press on "Confirm".
[[File:Thunderbird10.png|500px]]
* After waiting for short time your keys are now successfully created for your account.
[[File:Thunderbird11.png|600px]]
* Scroll down in the same page then choose "Enable encryption for new messages" (This will require to have recipient OpenPGP key otherwise messages wont be encrypted).
* "Sign unencrypted messages" and "Attach my public key when adding an OpenPGP digital signature" are for better authenticity and usability but they are left to the user to decide.
* Make sure these options are ticked "Encrypt the subject of OpenPGP messages" and "Store draft messages in encrypted format"
[[File:Thunderbird12.png|600px]]
== Export and Store your Keys ==
{{Box|text=
'''1.''' Go to "End-to-end encryption".
[[File:Thunderbird6-1.png|500px]]
'''2.''' Then press on "OpenPGP Key Manager".
[[File:Thunderbird13.png|600px]]
'''3.''' Then press on your email (highlight it) if there is more than one email then "File".
[[File:Thunderbird14.png|600px]]
'''4.''' Then Export your Public and Secret Keys for backup as your public key used by the recipients to encrypt messages and secret key used for decrypting messages (Make sure to save them in a secure place, otherwise anybody can decrypt and read your encrypted emails if your secret key lost).
[[File:Thunderbird15.png|600px]]
'''5.''' At the moment thunderbird doesn't give UI way to export your revoke key https://bugzilla.mozilla.org/show_bug.cgi?id=1657901 https://bugzilla.mozilla.org/show_bug.cgi?id=1722825, But you can revoke your key from "OpenPGP Key Manager" (Read the warning message, don't proceed unless you really want to get rid/change of your current key).
[[File:Thunderbird16.png|600px]]
[[File:Thunderbird17.png|600px]]
}}
== Encrypt the Revocation Certificate ==
The revocation certificate can be encrypted and stored in the persistent storage directory. The GPG revocation certificate can be used to revoke the public encryption key that is added to key servers, even if access to the GPG secret key is lost or the password is forgotten.
If an attacker accesses the GPG revocation certificate, they can revoke the keys. Encrypting the GPG revocation certificate with a passphrase will protect against this action.
At the moment of writing there isn't a UI/graphical friendly way of doing this through thunderbird https://thunderbird.topicbox.com/groups/e2ee/Tb249a2dc3984e8e3/getting-the-revoke-certificate.
As encryption tool you can use [https://packages.debian.org/stable/zulucrypt-gui zulucrypt] as an example (installed by default in {{project_name_short}}).
= Final Thunderbird and Email Account Settings =
== Configure Thunderbird Folders from Account Settings ==
{{Box|text=
'''1.''' Go to your "Account Settings"
[[File:Thunderbird18.png|600px]]
'''2.''' Click on "Copies & Folders" in the left column. Each option to change is highlighted in red in the figure below:
* In the pull down menu next to "Sent Folder on", select "Local Folders."
* In the pull down menu next to "Archives Folder on", select "Local Folders."
* In the pull down menu next to "Drafts Folder on", select "Local Folders."
* In the pull down menu next to "Templates Folder on", select "Local Folders."
* Check the box next to "Show confirmation dialog when messages are saved."
'''Figure:''' ''Folder Configuration''
[[File:Thunderbird19.png|600px]]
[[File:Thunderbird20.png|600px]]
'''3.''' ('''Optional''') Empty Thunderbird trash on exit.
Click on "Local Folders" in the left column. Then, check the box next to "Empty trash on exit."
'''Figure:''' ''Empty Local Folders''
[[File:Thunderbird21.png|600px]]
}}
== General Thunderbird Settings ==
{{Box|text=
'''1.''' Set the Menu Bar.
* Right-Click in the empty top bar of thunderbird.
* Then tick "Menu Bar"
'''Figure:''' ''Thunderbird Menu Bar''
[[File:Thunderbird22.png|600px]]
'''2.''' Access Thunderbird Settings.
* In the menu bar, click on "Edit" and then click "Settings".
* Or press the cog icon which will lead you to "Settings" as well.
'''Figure:''' ''Thunderbird Preferences''
[[File:Thunderbird23.png|600px]]
'''3.''' Disable the return receipt function.
* Scroll down then press on "Return Receipts..."
* In the next window that appears, mark the circle next to "Never send a return receipt." Then, click the "OK" button.
'''Figure:''' ''Disable Return Receipts''
[[File:Thunderbird24.png|600px]]
[[File:Thunderbird25.png|600px]]
'''4.''' (Optional) Receive confirmation mail when message sent to the recipient
* From "General" scroll down to "Config Editor..."
* Search for mail.dsn.always_request_on
* Double click on it to turn it from false
to true
* You will receive "Successful Mail Delivery Report" after sending successful message.
[[File:Thunderbirddsn.png|600px]]
[[File:Thunderbirddsn2.png|600px]]
[[File:Thunderbirddsn3.png|600px]]
'''5.''' Send and receive plain text messages.
* One of [https://efail.de/ Efail] prevention is to avoid HTML messages all together
* Click on "Composition" then choose "Only Plain Text".
* From Menu Bar click on "View" then "Message Body As" then tick "Plain Text".
'''Figure:''' ''Plain Text Messages''
[[File:Thunderbird25-1.png|600px]]
[[File:Thunderbird25-2.png|600px]]
'''6.''' Disable website history and Sites cookies.
* Next, click the "Privacy & Security" button. Then, untick the box next to "Remember websites and links I've visited" and "Accept cookies from sites".
'''Figure:''' ''Modify Privacy Settings''
[[File:Thunderbird26.png|600px]]
}}
== Import Public Keys (From File) ==
{{Box|text=
{{mbox
| type = notice
| image = [[File:Ambox_notice.png|40px|alt=Info]]
| text = Always search with the long fingerprint of a GPG key in the key manager -- short or even long key IDs can be forged. Due to the threat of collisions, see: https://superuser.com/questions/769452/what-is-a-openpgp-gnupg-key-id. The results are more secure and work more often. Everyone who shares a public GPG key should share a long fingerprint.
}}
{{mbox
| image = [[File:Ambox_warning_pn.svg.png|40px]]
| text = '''Important:''' It is critical to verify any GPG public key that is added to the keyring with a fingerprint provided by the person you intend to communicate with.
}}
Import GPG public key of an intended email recipient keys into Thunderbird:
* Go to "End-to-end encryption"
[[File:Thunderbird6-1.png|600px]]
* Then press on "OpenPGP Key Manager"
[[File:Thunderbird13.png|600px]]
* Go to "File" then choose "Import Public Key(s) From File"
[[File:Thunderbird27.png|600px]]
* Go to the path that where the public key is located and double-click it
[[File:Thunderbird28.png|600px]]
* It will show you key fingerprint, if you can verify/sure that the person with this fingerprint match what you have added then press on "Accepted (unverified)" otherwise use the default "Not Accepted (Undecided)"
[[File:Thunderbird29.png|600px]]
* Key is now imported successfully, if you want to change the acceptance level press on "View Details and and manage key acceptance"
[[File:Thunderbird30.png|600px]]
* See which option do you prefer to choose for the added keys
[[File:Thunderbird30-1.png|600px]]
}}
= Compose and Send Encrypted Email =
{{Box|text=
'''1.''' Compose a new email message.
* Press on "Write"
[[File:Thunderbird31-1.png|600px]]
{{mbox
| type = notice
| image = [[File:Ambox_notice.png|40px|alt=Info]]
| text = Since the danwin1210.de
email service is hosted on the .onion
Tor server danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5ubupvtpid.onion
you are going to send an email to the .onion
domain. This keeps the transit of the email inside the Tor network, which is safer than transporting it in the clear. If an email provider of someone you want to send an email to uses a .onion
domain, always use that domain in the To
field if possible.
}}
'''2.''' Send the email message.
* Make sure padlock "Encrypt" is active.
* Press on the down arrow near "OpenPGP" then make sure "Encrypt" and "Encrypt Subject" are ticked.
* '''Optional''' For the authenticity and easiness:
** Tick "Digitally Sign".
** Tick "My OpenPGP Public Key" from "Attachment".
* When the message is ready, click the "Send" button (preferable to just send small message without details for testing purposes as a beginner).
[[File:Thunderbird31.png|600px]]
[[File:Thunderbird31-2.png|600px]]
'''3.''' How the message will look like on recipient side.
* To receive new messages click "Get Messages"
* OpenPGP with green tick and padlock mean the message encrypted.
* @danwin1210.de mean the message sent over clearnet.
[[File:Thunderbird32-1.png|600px]]
[[File:Thunderbird32.png|600px]]
'''4.''' Recipient importing key attached by email.
* Right-Click on the attachment then choose "Import OpenPGP Key"
* Then check steps explained in [[Encrypted_Email_with_Thunderbird#Import_Public_Keys_(From_File)|Import Public Keys]].
[[File:Thunderbird33.png|600px]]
[[File:Thunderbird34.png|600px]]
}}
== Add User ID to Key Properties ==
{{Box|text=
Undocumented
}}
== Export the Public Key to a GPG Server ==
{{Box|text=
Undocumented
}}
= Using Thunderbird with the System GnuPG Keyring =
{{Box|text=
Undocumented
}}
= Final Warnings =
If all steps have been successfully completed then you now have an anonymous email account paired with strong encryption.
It should be emphasized this wiki entry is not a substitute for an all-inclusive tutorial on the safest way to use GPG/PGP encryption, however it provides a solid foundation for fundamental practices. Numerous advanced resources and expert opinions exist on the Internet, and these can provide additional tips that might better address a user's perceived threat model and circumstances. For instance, users at high risk might generate a strong [[Air_Gapped_OpenPGP_Key|airgapped OpenPGP key pair]] on the command line for greater security, rather than rely on Thunderbird. At a minimum, it is recommended to review the [[E-Mail#Safe_Email_Principles|Safe Email Principles]] section, along with [[#Further_Reading|additional learning resources]].
Finally, always heed the following warnings regarding email:
* Email is a ''very insecure'' means of communication where anonymity is concerned. A lot of metadata is leaked with email, so it should be used sparingly and only when strictly necessary.
* Do not contact people you know in real life at non-anonymous email addresses with the email account that was created here. Always separate real world identities from online identities used with {{project_name_short}}.
* Be circumspect about sharing personal information in email! Encrypted email does not protect against the email recipient storing personal emails in an unencrypted format. Nor does encryption protect against an email recipient maliciously using personal information in order to exploit you.
* If an email is sent to a recipient without encryption, assume it can be read by anyone!
* Utilize the Tor Onion Service (.onion domain) whenever it is made available by the email provider. After first confirming the domain is controlled by the email provider, it will afford greater protection than a clearnet address.
= Further Reading =
Interested readers can refer to the following additional resources on GPG, GPA, and safe email practices:
* [https://www.gnupg.org/documentation/ GnuPG documentation]
* [https://www.gnupg.org/software/gpa/index.html GPA Upstream]
* [[OpenPGP | OpenPGP key distribution strategies]]
* [https://help.riseup.net/en/security/message-security/openpgp/best-practices Best Practices]
= Footnotes =
{{reflist|close=1}}
{{Footer}}
[[Category:Documentation]]